Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CERTFR-2018-AVI-140
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans SCADA les produits Siemens . Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
Vendor | Product | Description | ||
---|---|---|---|---|
Siemens | N/A | SIMATIC WinCC OA UI pour Android versions antérieures à V3.15.10 | ||
Siemens | N/A | Desigo Automation Controllers for Integration PXC001-E.D versions antérieures à V6.00.204 | ||
Siemens | N/A | SIMATIC S7-1500 incl. F versions antérieures à V1.8.5 | ||
Siemens | N/A | Desigo Automation Controllers Compact PXC12/22/36-E.D versions antérieures à V6.00.204 | ||
Siemens | N/A | Desigo Automation Controllers PXC00/64/128-U avec module Web versions antérieures à V6.00.204 | ||
Siemens | N/A | SIMATIC S7-1500 Software Controller incl. F versions antérieures à V1.8.5 | ||
Siemens | N/A | Desigo Automation Controllers Modular PXC00/50/100/200-E.D versions antérieures à V6.00.204 | ||
Siemens | N/A | SIMATIC WinCC OA UI pour iOS versions antérieures à V3.15.10 | ||
Siemens | N/A | SIMATIC S7-410 versions antérieures à V8.1 | ||
Siemens | N/A | Desigo Operator Unit PXM20-E versions antérieures à V6.00.204 | ||
Siemens | N/A | SIMATIC S7-400 PN/DP V6 Incl. F versions antérieures à V6.0.7 |
References
Title | Publication Time | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "SIMATIC WinCC OA UI pour Android versions ant\u00e9rieures \u00e0 V3.15.10", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Desigo Automation Controllers for Integration PXC001-E.D versions ant\u00e9rieures \u00e0 V6.00.204", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC S7-1500 incl. F versions ant\u00e9rieures \u00e0 V1.8.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Desigo Automation Controllers Compact PXC12/22/36-E.D versions ant\u00e9rieures \u00e0 V6.00.204", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Desigo Automation Controllers PXC00/64/128-U avec module Web versions ant\u00e9rieures \u00e0 V6.00.204", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC S7-1500 Software Controller incl. F versions ant\u00e9rieures \u00e0 V1.8.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Desigo Automation Controllers Modular PXC00/50/100/200-E.D versions ant\u00e9rieures \u00e0 V6.00.204", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC WinCC OA UI pour iOS versions ant\u00e9rieures \u00e0 V3.15.10", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC S7-410 versions ant\u00e9rieures \u00e0 V8.1", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Desigo Operator Unit PXM20-E versions ant\u00e9rieures \u00e0 V6.00.204", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC S7-400 PN/DP V6 Incl. F versions ant\u00e9rieures \u00e0 V6.0.7", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2018-4834", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4834" }, { "name": "CVE-2018-4844", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4844" }, { "name": "CVE-2018-4843", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4843" } ], "initial_release_date": "2018-03-21T00:00:00", "last_revision_date": "2018-03-21T00:00:00", "links": [], "reference": "CERTFR-2018-AVI-140", "revisions": [ { "description": "Version initiale", "revision_date": "2018-03-21T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans SCADA les produits\nSiemens . Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service \u00e0 distance, un contournement de la politique de\ns\u00e9curit\u00e9 et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans SCADA les produits Siemens", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 SCADA Siemens ssa-824231 du 20 mars 2018", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-824231.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 SCADA Siemens ssa-592007 du 20 mars 2018", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-592007.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 SCADA Siemens ssa-822928 du 20 mars 2018", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-822928.pdf" } ] }
CVE-2018-4844 (GCVE-0-2018-4844)
Vulnerability from cvelistv5
Published
2018-03-20 14:00
Modified
2024-09-17 03:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-284 - Improper Access Control
Summary
A vulnerability has been identified in SIMATIC WinCC OA UI for Android (All versions < V3.15.10), SIMATIC WinCC OA UI for iOS (All versions < V3.15.10). Insufficient limitation of CONTROL script capabilities could allow read and write access from one HMI project cache folder to other HMI project cache folders within the app's sandbox on the same mobile device. This includes HMI project cache folders of other configured WinCC OA servers. The security vulnerability could be exploited by an attacker who tricks an app user to connect to an attacker-controlled WinCC OA server. Successful exploitation requires user interaction and read/write access to the app's folder on a mobile device. The vulnerability could allow reading data from and writing data to the app's folder. At the time of advisory publication no public exploitation of this security vulnerability was known. Siemens confirms the security vulnerability and provides mitigations to resolve the security issue.
References
URL | Tags | |||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Siemens AG | SIMATIC WinCC OA UI for Android, SIMATIC WinCC OA UI for iOS |
Version: SIMATIC WinCC OA UI for Android : All versions < V3.15.10 Version: SIMATIC WinCC OA UI for iOS : All versions < V3.15.10 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:18:26.503Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-822928.pdf" }, { "name": "103475", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103475" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SIMATIC WinCC OA UI for Android, SIMATIC WinCC OA UI for iOS", "vendor": "Siemens AG", "versions": [ { "status": "affected", "version": "SIMATIC WinCC OA UI for Android : All versions \u003c V3.15.10" }, { "status": "affected", "version": "SIMATIC WinCC OA UI for iOS : All versions \u003c V3.15.10" } ] } ], "datePublic": "2018-03-20T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SIMATIC WinCC OA UI for Android (All versions \u003c V3.15.10), SIMATIC WinCC OA UI for iOS (All versions \u003c V3.15.10). Insufficient limitation of CONTROL script capabilities could allow read and write access from one HMI project cache folder to other HMI project cache folders within the app\u0027s sandbox on the same mobile device. This includes HMI project cache folders of other configured WinCC OA servers. The security vulnerability could be exploited by an attacker who tricks an app user to connect to an attacker-controlled WinCC OA server. Successful exploitation requires user interaction and read/write access to the app\u0027s folder on a mobile device. The vulnerability could allow reading data from and writing data to the app\u0027s folder. At the time of advisory publication no public exploitation of this security vulnerability was known. Siemens confirms the security vulnerability and provides mitigations to resolve the security issue." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-22T09:57:01", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-822928.pdf" }, { "name": "103475", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103475" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "DATE_PUBLIC": "2018-03-20T00:00:00", "ID": "CVE-2018-4844", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SIMATIC WinCC OA UI for Android, SIMATIC WinCC OA UI for iOS", "version": { "version_data": [ { "version_value": "SIMATIC WinCC OA UI for Android : All versions \u003c V3.15.10" }, { "version_value": "SIMATIC WinCC OA UI for iOS : All versions \u003c V3.15.10" } ] } } ] }, "vendor_name": "Siemens AG" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SIMATIC WinCC OA UI for Android (All versions \u003c V3.15.10), SIMATIC WinCC OA UI for iOS (All versions \u003c V3.15.10). Insufficient limitation of CONTROL script capabilities could allow read and write access from one HMI project cache folder to other HMI project cache folders within the app\u0027s sandbox on the same mobile device. This includes HMI project cache folders of other configured WinCC OA servers. The security vulnerability could be exploited by an attacker who tricks an app user to connect to an attacker-controlled WinCC OA server. Successful exploitation requires user interaction and read/write access to the app\u0027s folder on a mobile device. The vulnerability could allow reading data from and writing data to the app\u0027s folder. At the time of advisory publication no public exploitation of this security vulnerability was known. Siemens confirms the security vulnerability and provides mitigations to resolve the security issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284: Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-822928.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-822928.pdf" }, { "name": "103475", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103475" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2018-4844", "datePublished": "2018-03-20T14:00:00Z", "dateReserved": "2018-01-02T00:00:00", "dateUpdated": "2024-09-17T03:12:54.178Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-4834 (GCVE-0-2018-4834)
Vulnerability from cvelistv5
Published
2018-01-24 16:00
Modified
2024-09-17 01:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-306 - Missing Authentication for Critical Function
Summary
A vulnerability has been identified in Desigo PXC00-E.D V4.10 (All versions < V4.10.111), Desigo PXC00-E.D V5.00 (All versions < V5.0.171), Desigo PXC00-E.D V5.10 (All versions < V5.10.69), Desigo PXC00-E.D V6.00 (All versions < V6.0.204), Desigo PXC00/64/128-U V4.10 (All versions < V4.10.111 only with web module), Desigo PXC00/64/128-U V5.00 (All versions < V5.0.171 only with web module), Desigo PXC00/64/128-U V5.10 (All versions < V5.10.69 only with web module), Desigo PXC00/64/128-U V6.00 (All versions < V6.0.204 only with web module), Desigo PXC001-E.D V4.10 (All versions < V4.10.111), Desigo PXC001-E.D V5.00 (All versions < V5.0.171), Desigo PXC001-E.D V5.10 (All versions < V5.10.69), Desigo PXC001-E.D V6.00 (All versions < V6.0.204), Desigo PXC100-E.D V4.10 (All versions < V4.10.111), Desigo PXC100-E.D V5.00 (All versions < V5.0.171), Desigo PXC100-E.D V5.10 (All versions < V5.10.69), Desigo PXC100-E.D V6.00 (All versions < V6.0.204), Desigo PXC12-E.D V4.10 (All versions < V4.10.111), Desigo PXC12-E.D V5.00 (All versions < V5.0.171), Desigo PXC12-E.D V5.10 (All versions < V5.10.69), Desigo PXC12-E.D V6.00 (All versions < V6.0.204), Desigo PXC200-E.D V4.10 (All versions < V4.10.111), Desigo PXC200-E.D V5.00 (All versions < V5.0.171), Desigo PXC200-E.D V5.10 (All versions < V5.10.69), Desigo PXC200-E.D V6.00 (All versions < V6.0.204), Desigo PXC22-E.D V4.10 (All versions < V4.10.111), Desigo PXC22-E.D V5.00 (All versions < V5.0.171), Desigo PXC22-E.D V5.10 (All versions < V5.10.69), Desigo PXC22-E.D V6.00 (All versions < V6.0.204), Desigo PXC22.1-E.D V4.10 (All versions < V4.10.111), Desigo PXC22.1-E.D V5.00 (All versions < V5.0.171), Desigo PXC22.1-E.D V5.10 (All versions < V5.10.69), Desigo PXC22.1-E.D V6.00 (All versions < V6.0.204), Desigo PXC36.1-E.D V4.10 (All versions < V4.10.111), Desigo PXC36.1-E.D V5.00 (All versions < V5.0.171), Desigo PXC36.1-E.D V5.10 (All versions < V5.10.69), Desigo PXC36.1-E.D V6.00 (All versions < V6.0.204), Desigo PXC50-E.D V4.10 (All versions < V4.10.111), Desigo PXC50-E.D V5.00 (All versions < V5.0.171), Desigo PXC50-E.D V5.10 (All versions < V5.10.69), Desigo PXC50-E.D V6.00 (All versions < V6.0.204), Desigo PXM20-E V4.10 (All versions < V4.10.111), Desigo PXM20-E V5.00 (All versions < V5.0.171), Desigo PXM20-E V5.10 (All versions < V5.10.69), Desigo PXM20-E V6.00 (All versions < V6.0.204). A remote attacker with network access to the device could potentially upload a new firmware image to the devices without prior authentication.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Siemens | Desigo PXC00-E.D V4.10 |
Version: All versions < V4.10.111 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:18:26.250Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-824231.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Desigo PXC00-E.D V4.10", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.10.111" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC00-E.D V5.00", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.0.171" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC00-E.D V5.10", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.10.69" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC00-E.D V6.00", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.0.204" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC00/64/128-U V4.10", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.10.111 only with web module" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC00/64/128-U V5.00", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.0.171 only with web module" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC00/64/128-U V5.10", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.10.69 only with web module" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC00/64/128-U V6.00", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.0.204 only with web module" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC001-E.D V4.10", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.10.111" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC001-E.D V5.00", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.0.171" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC001-E.D V5.10", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.10.69" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC001-E.D V6.00", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.0.204" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC100-E.D V4.10", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.10.111" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC100-E.D V5.00", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.0.171" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC100-E.D V5.10", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.10.69" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC100-E.D V6.00", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.0.204" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC12-E.D V4.10", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.10.111" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC12-E.D V5.00", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.0.171" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC12-E.D V5.10", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.10.69" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC12-E.D V6.00", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.0.204" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC200-E.D V4.10", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.10.111" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC200-E.D V5.00", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.0.171" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC200-E.D V5.10", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.10.69" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC200-E.D V6.00", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.0.204" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC22-E.D V4.10", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.10.111" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC22-E.D V5.00", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.0.171" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC22-E.D V5.10", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.10.69" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC22-E.D V6.00", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.0.204" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC22.1-E.D V4.10", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.10.111" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC22.1-E.D V5.00", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.0.171" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC22.1-E.D V5.10", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.10.69" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC22.1-E.D V6.00", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.0.204" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC36.1-E.D V4.10", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.10.111" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC36.1-E.D V5.00", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.0.171" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC36.1-E.D V5.10", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.10.69" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC36.1-E.D V6.00", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.0.204" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC50-E.D V4.10", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.10.111" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC50-E.D V5.00", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.0.171" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC50-E.D V5.10", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.10.69" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXC50-E.D V6.00", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.0.204" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXM20-E V4.10", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.10.111" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXM20-E V5.00", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.0.171" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXM20-E V5.10", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.10.69" } ] }, { "defaultStatus": "unknown", "product": "Desigo PXM20-E V6.00", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.0.204" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Desigo PXC00-E.D V4.10 (All versions \u003c V4.10.111), Desigo PXC00-E.D V5.00 (All versions \u003c V5.0.171), Desigo PXC00-E.D V5.10 (All versions \u003c V5.10.69), Desigo PXC00-E.D V6.00 (All versions \u003c V6.0.204), Desigo PXC00/64/128-U V4.10 (All versions \u003c V4.10.111 only with web module), Desigo PXC00/64/128-U V5.00 (All versions \u003c V5.0.171 only with web module), Desigo PXC00/64/128-U V5.10 (All versions \u003c V5.10.69 only with web module), Desigo PXC00/64/128-U V6.00 (All versions \u003c V6.0.204 only with web module), Desigo PXC001-E.D V4.10 (All versions \u003c V4.10.111), Desigo PXC001-E.D V5.00 (All versions \u003c V5.0.171), Desigo PXC001-E.D V5.10 (All versions \u003c V5.10.69), Desigo PXC001-E.D V6.00 (All versions \u003c V6.0.204), Desigo PXC100-E.D V4.10 (All versions \u003c V4.10.111), Desigo PXC100-E.D V5.00 (All versions \u003c V5.0.171), Desigo PXC100-E.D V5.10 (All versions \u003c V5.10.69), Desigo PXC100-E.D V6.00 (All versions \u003c V6.0.204), Desigo PXC12-E.D V4.10 (All versions \u003c V4.10.111), Desigo PXC12-E.D V5.00 (All versions \u003c V5.0.171), Desigo PXC12-E.D V5.10 (All versions \u003c V5.10.69), Desigo PXC12-E.D V6.00 (All versions \u003c V6.0.204), Desigo PXC200-E.D V4.10 (All versions \u003c V4.10.111), Desigo PXC200-E.D V5.00 (All versions \u003c V5.0.171), Desigo PXC200-E.D V5.10 (All versions \u003c V5.10.69), Desigo PXC200-E.D V6.00 (All versions \u003c V6.0.204), Desigo PXC22-E.D V4.10 (All versions \u003c V4.10.111), Desigo PXC22-E.D V5.00 (All versions \u003c V5.0.171), Desigo PXC22-E.D V5.10 (All versions \u003c V5.10.69), Desigo PXC22-E.D V6.00 (All versions \u003c V6.0.204), Desigo PXC22.1-E.D V4.10 (All versions \u003c V4.10.111), Desigo PXC22.1-E.D V5.00 (All versions \u003c V5.0.171), Desigo PXC22.1-E.D V5.10 (All versions \u003c V5.10.69), Desigo PXC22.1-E.D V6.00 (All versions \u003c V6.0.204), Desigo PXC36.1-E.D V4.10 (All versions \u003c V4.10.111), Desigo PXC36.1-E.D V5.00 (All versions \u003c V5.0.171), Desigo PXC36.1-E.D V5.10 (All versions \u003c V5.10.69), Desigo PXC36.1-E.D V6.00 (All versions \u003c V6.0.204), Desigo PXC50-E.D V4.10 (All versions \u003c V4.10.111), Desigo PXC50-E.D V5.00 (All versions \u003c V5.0.171), Desigo PXC50-E.D V5.10 (All versions \u003c V5.10.69), Desigo PXC50-E.D V6.00 (All versions \u003c V6.0.204), Desigo PXM20-E V4.10 (All versions \u003c V4.10.111), Desigo PXM20-E V5.00 (All versions \u003c V5.0.171), Desigo PXM20-E V5.10 (All versions \u003c V5.10.69), Desigo PXM20-E V6.00 (All versions \u003c V6.0.204). A remote attacker with network access to the device could potentially upload a new firmware image to the devices without prior authentication." } ], "metrics": [ { "cvssV3_1": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306: Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-13T08:16:45.726Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-824231.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2018-4834", "datePublished": "2018-01-24T16:00:00Z", "dateReserved": "2018-01-02T00:00:00", "dateUpdated": "2024-09-17T01:35:52.508Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-4843 (GCVE-0-2018-4843)
Vulnerability from cvelistv5
Published
2018-03-20 14:00
Modified
2024-08-05 05:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
A vulnerability has been identified in SIMATIC S7-400 CPU 414-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 414F-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 416-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 416F-3 PN/DP V7 (All versions < V7.0.3), SIMATIC CP 343-1 (incl. SIPLUS variants) (All versions), SIMATIC CP 343-1 Advanced (incl. SIPLUS variants) (All versions), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 Advanced (All versions < V3.3), SIMATIC ET 200pro IM154-8 PN/DP CPU (All versions < V3.2.16), SIMATIC ET 200pro IM154-8F PN/DP CPU (All versions < V3.2.16), SIMATIC ET 200pro IM154-8FX PN/DP CPU (All versions < V3.2.16), SIMATIC ET 200S IM151-8 PN/DP CPU (All versions < V3.2.16), SIMATIC ET 200S IM151-8F PN/DP CPU (All versions < V3.2.16), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V1.7.0), SIMATIC S7-1500 Software Controller (All versions < V1.7.0), SIMATIC S7-300 CPU 314C-2 PN/DP (All versions < V3.3.16), SIMATIC S7-300 CPU 315-2 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 315F-2 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 315T-3 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 317-2 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 317F-2 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 317T-3 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 317TF-3 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 319-3 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 319F-3 PN/DP (All versions < V3.2.16), SIMATIC S7-400 CPU 412-2 PN V7 (All versions < V7.0.3), SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) (All versions < V6.0.9), SIMATIC S7-400 PN/DP V6 CPU family (incl. SIPLUS variants) (All versions < V6.0.7), SIMATIC S7-410 CPU family (incl. SIPLUS variants) (All versions < V8.1), SIMATIC WinAC RTX 2010 (All versions < V2010 SP3), SIMATIC WinAC RTX F 2010 (All versions < V2010 SP3), SINUMERIK 828D (All versions < V4.7 SP6 HF1), SIPLUS ET 200S IM151-8 PN/DP CPU (All versions < V3.2.16), SIPLUS ET 200S IM151-8F PN/DP CPU (All versions < V3.2.16), SIPLUS NET CP 443-1 (All versions < V3.3), SIPLUS NET CP 443-1 Advanced (All versions < V3.3), SIPLUS S7-300 CPU 314C-2 PN/DP (All versions < V3.3.16), SIPLUS S7-300 CPU 315-2 PN/DP (All versions < V3.2.16), SIPLUS S7-300 CPU 315F-2 PN/DP (All versions < V3.2.16), SIPLUS S7-300 CPU 317-2 PN/DP (All versions < V3.2.16), SIPLUS S7-300 CPU 317F-2 PN/DP (All versions < V3.2.16), SIPLUS S7-400 CPU 414-3 PN/DP V7 (All versions < V7.0.3), SIPLUS S7-400 CPU 416-3 PN/DP V7 (All versions < V7.0.3), Softnet PROFINET IO for PC-based Windows systems (All versions). Responding to a PROFINET DCP request with a specially crafted PROFINET DCP packet could cause a denial of service condition of the requesting system.
The security vulnerability could be exploited by an attacker located on the same Ethernet segment (OSI Layer 2) as the targeted device. A manual restart is required to recover the system.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:18:26.626Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-592007.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": " SIMATIC S7-400 CPU 414-3 PN/DP V7", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.0.3" } ] }, { "defaultStatus": "unknown", "product": " SIMATIC S7-400 CPU 414F-3 PN/DP V7", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.0.3" } ] }, { "defaultStatus": "unknown", "product": " SIMATIC S7-400 CPU 416-3 PN/DP V7", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.0.3" } ] }, { "defaultStatus": "unknown", "product": " SIMATIC S7-400 CPU 416F-3 PN/DP V7", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.0.3" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 343-1 (incl. SIPLUS variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 343-1 Advanced (incl. SIPLUS variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 443-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.3" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 443-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.3" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 443-1 Advanced", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.3" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET 200pro IM154-8 PN/DP CPU", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.2.16" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET 200pro IM154-8F PN/DP CPU", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.2.16" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET 200pro IM154-8FX PN/DP CPU", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.2.16" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET 200S IM151-8 PN/DP CPU", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.2.16" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET 200S IM151-8F PN/DP CPU", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.2.16" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V1.7.0" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC S7-1500 Software Controller", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V1.7.0" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC S7-300 CPU 314C-2 PN/DP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.3.16" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC S7-300 CPU 315-2 PN/DP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.2.16" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC S7-300 CPU 315F-2 PN/DP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.2.16" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC S7-300 CPU 315T-3 PN/DP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.2.16" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC S7-300 CPU 317-2 PN/DP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.2.16" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC S7-300 CPU 317F-2 PN/DP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.2.16" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC S7-300 CPU 317T-3 PN/DP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.2.16" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC S7-300 CPU 317TF-3 PN/DP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.2.16" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC S7-300 CPU 319-3 PN/DP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.2.16" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC S7-300 CPU 319F-3 PN/DP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.2.16" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC S7-400 CPU 412-2 PN V7", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.0.3" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.0.9" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC S7-400 PN/DP V6 CPU family (incl. SIPLUS variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.0.7" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC S7-410 CPU family (incl. SIPLUS variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V8.1" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC WinAC RTX 2010", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2010 SP3" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC WinAC RTX F 2010", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2010 SP3" } ] }, { "defaultStatus": "unknown", "product": "SINUMERIK 828D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.7 SP6 HF1" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS ET 200S IM151-8 PN/DP CPU", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.2.16" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS ET 200S IM151-8F PN/DP CPU", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.2.16" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET CP 443-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.3" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET CP 443-1 Advanced", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.3" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS S7-300 CPU 314C-2 PN/DP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.3.16" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS S7-300 CPU 315-2 PN/DP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.2.16" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS S7-300 CPU 315F-2 PN/DP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.2.16" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS S7-300 CPU 317-2 PN/DP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.2.16" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS S7-300 CPU 317F-2 PN/DP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.2.16" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS S7-400 CPU 414-3 PN/DP V7", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.0.3" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS S7-400 CPU 416-3 PN/DP V7", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.0.3" } ] }, { "defaultStatus": "unknown", "product": "Softnet PROFINET IO for PC-based Windows systems", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SIMATIC S7-400 CPU 414-3 PN/DP V7 (All versions \u003c V7.0.3), SIMATIC S7-400 CPU 414F-3 PN/DP V7 (All versions \u003c V7.0.3), SIMATIC S7-400 CPU 416-3 PN/DP V7 (All versions \u003c V7.0.3), SIMATIC S7-400 CPU 416F-3 PN/DP V7 (All versions \u003c V7.0.3), SIMATIC CP 343-1 (incl. SIPLUS variants) (All versions), SIMATIC CP 343-1 Advanced (incl. SIPLUS variants) (All versions), SIMATIC CP 443-1 (All versions \u003c V3.3), SIMATIC CP 443-1 (All versions \u003c V3.3), SIMATIC CP 443-1 Advanced (All versions \u003c V3.3), SIMATIC ET 200pro IM154-8 PN/DP CPU (All versions \u003c V3.2.16), SIMATIC ET 200pro IM154-8F PN/DP CPU (All versions \u003c V3.2.16), SIMATIC ET 200pro IM154-8FX PN/DP CPU (All versions \u003c V3.2.16), SIMATIC ET 200S IM151-8 PN/DP CPU (All versions \u003c V3.2.16), SIMATIC ET 200S IM151-8F PN/DP CPU (All versions \u003c V3.2.16), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions \u003c V1.7.0), SIMATIC S7-1500 Software Controller (All versions \u003c V1.7.0), SIMATIC S7-300 CPU 314C-2 PN/DP (All versions \u003c V3.3.16), SIMATIC S7-300 CPU 315-2 PN/DP (All versions \u003c V3.2.16), SIMATIC S7-300 CPU 315F-2 PN/DP (All versions \u003c V3.2.16), SIMATIC S7-300 CPU 315T-3 PN/DP (All versions \u003c V3.2.16), SIMATIC S7-300 CPU 317-2 PN/DP (All versions \u003c V3.2.16), SIMATIC S7-300 CPU 317F-2 PN/DP (All versions \u003c V3.2.16), SIMATIC S7-300 CPU 317T-3 PN/DP (All versions \u003c V3.2.16), SIMATIC S7-300 CPU 317TF-3 PN/DP (All versions \u003c V3.2.16), SIMATIC S7-300 CPU 319-3 PN/DP (All versions \u003c V3.2.16), SIMATIC S7-300 CPU 319F-3 PN/DP (All versions \u003c V3.2.16), SIMATIC S7-400 CPU 412-2 PN V7 (All versions \u003c V7.0.3), SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) (All versions \u003c V6.0.9), SIMATIC S7-400 PN/DP V6 CPU family (incl. SIPLUS variants) (All versions \u003c V6.0.7), SIMATIC S7-410 CPU family (incl. SIPLUS variants) (All versions \u003c V8.1), SIMATIC WinAC RTX 2010 (All versions \u003c V2010 SP3), SIMATIC WinAC RTX F 2010 (All versions \u003c V2010 SP3), SINUMERIK 828D (All versions \u003c V4.7 SP6 HF1), SIPLUS ET 200S IM151-8 PN/DP CPU (All versions \u003c V3.2.16), SIPLUS ET 200S IM151-8F PN/DP CPU (All versions \u003c V3.2.16), SIPLUS NET CP 443-1 (All versions \u003c V3.3), SIPLUS NET CP 443-1 Advanced (All versions \u003c V3.3), SIPLUS S7-300 CPU 314C-2 PN/DP (All versions \u003c V3.3.16), SIPLUS S7-300 CPU 315-2 PN/DP (All versions \u003c V3.2.16), SIPLUS S7-300 CPU 315F-2 PN/DP (All versions \u003c V3.2.16), SIPLUS S7-300 CPU 317-2 PN/DP (All versions \u003c V3.2.16), SIPLUS S7-300 CPU 317F-2 PN/DP (All versions \u003c V3.2.16), SIPLUS S7-400 CPU 414-3 PN/DP V7 (All versions \u003c V7.0.3), SIPLUS S7-400 CPU 416-3 PN/DP V7 (All versions \u003c V7.0.3), Softnet PROFINET IO for PC-based Windows systems (All versions). Responding to a PROFINET DCP request with a specially crafted PROFINET DCP packet could cause a denial of service condition of the requesting system.\r\n\r\nThe security vulnerability could be exploited by an attacker located on the same Ethernet segment (OSI Layer 2) as the targeted device. A manual restart is required to recover the system." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-09T11:50:59.460Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-592007.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2018-4843", "datePublished": "2018-03-20T14:00:00", "dateReserved": "2018-01-02T00:00:00", "dateUpdated": "2024-08-05T05:18:26.626Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…